1. What is the goal of a dusting attack?
To use the dusted addresses in an attempt to identify which wallet they belong to and then identify who owns that wallet.
2. If a dusting attack is successful, how is the victim at risk?
- Loss of anonymity
- May be targeted in a cyber extortion or phising attack
3. Do deterministic wallets protect against dusting attacks?
Deterministic wallets can protect against dusting attacks if new addresses are used for each receiving transaction. However, the danger remains if the dusting attack UTXOs are used as input for another transaction as this will link together other UTXOs that belong to the same wallet.
4. What features did Samourai Wallet add to protect against dusting attacks?
Samourai wallet implemented a “do not spend” flag for suspicious transactions to make sure the dust UTXOs don’t get spent.